Morse Watchmans, global provider of key control and asset management systems, is showcasing their KeyWatcher Touch key management system at ISC East in New York City. Also, on display is AssetWatcher, their RFID-powered asset management solution for sensitive and valuable assets. KeyWatcher Touch system “We always love the opportunity to get our product in front of new faces,” said Fernando Pires, CEO at Morse Watchmans. “ISC East gives us the chance to show the NY metro area...
Aadhaar authentication, for attendance marking, has now been made mandatory for employees working in the government organisations. Matrix Aadhaar Enabled Biometric Attendance Device – COSEC VEGA FAXQ – is the first of its kind. This device enables employees to directly mark their attendance, without having to manually entering their Aadhaar number. They can either use a smart card or the keypad on the device followed by their fingerprint authentication to mark their attendance. If u...
Dahua Technology, a solution provider in the global video surveillance industry, has launched a new apartment outdoor station VTO9341D, providing new access control solutions to fence and lobby entrance with the cutting-edge face recognition technology. The apartment outdoor station elevates the safety and convenience of resident security system to a new level with the fashionable non-touch face-recognition entry, while conventional unlocking ways are preserved in case of emergency. The product...
“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a...
HID Global, a worldwide provider of trusted identity solutions, announced that it has acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services, making HID Global one of the world’s major providers of fingerprint biometric technologies....
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, is showcasing the company’s continuing advances in technology and customer support in booth #1715 at the GSX (formerly ASIS) exhibition in Las Vegas, NV from September 25-27. With the launch of their new Interactive Troubleshooting Guides for Security Entrances, a range of new partner technology integrations and the growing adoption of anti-tailgating and anti-piggybacking entrances by Fortune 50 Glo...
HID Global, a worldwide provider of trusted identity solutions, announced its patented Lumidigm multispectral imaging solution is the first fingerprint technology certified to the ISO/IEC 30107-3 Presentation Attack Detection (PAD) standard, which focuses on anti-spoofing and liveness detection to determine whether fingerprint data captured from the sensor is from a real, living person or from a plastic fake or other artificial copy. Since the specification’s release more than a year ago, only the Lumidigm V-Series solution has stopped all fake-finger attacks to receive a perfect certification score in a Level 1 test, which was administered by iBeta Quality Assurance and certified by the National Institute of Standards and Technology (NIST) National Voluntary Laboratory Accreditation Program (NVLAP). Ensuring fingerprint data is real Deployed globally, these fingerprint sensors authenticate billions of transactions annually"“This industry certification is an important accomplishment which validates the security- and privacy-enhancing capabilities of our multispectral fingerprint capture technology,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global. “Deployed globally, these fingerprint sensors authenticate billions of transactions annually. They provide trust whenever they are used to validate a person’s identity to grant access, deliver services or distribute funds, because each time they ensure that fingerprint data is from a real person rather than a fake or stolen sample.” The independent test result is based on the global ISO/IEC 30107-3 standard, which established procedures for testing and reporting a device’s level of susceptibility to fake fingerprints, also called spoofing attacks. During these tests, the fake fingerprint is presented to a biometric capture device by an imposter to gain unauthorised access, steal an identity for fraudulent use, or evade a watch list. Receiving a perfect score during Level 1 certification testing means the Lumidigm technology detected 100 percent of spoof attempts while correctly authenticating legitimate users. Importance of liveness detection Liveness detection is a critical component of a trusted fingerprint biometric security architecture"“Liveness detection is a critical component of a trusted fingerprint biometric security architecture that also includes capture and template-matching capabilities,” said Michael Thieme, Novetta Vice President of Special Projects and Editor of ISO/IEC 30107-3. "Organisations deploying biometric systems should consider independently-validated PAD solutions to help ensure the biometric products they deploy defend against these types of attacks." Liveness detection is increasingly important for ensuring the integrity of what Acuity Market Intelligence forecasts will be more than one trillion cloud-based biometric transactions annually by 2022. In 2015, more than 21.5 million people were affected by a breach of the U.S. Office of Personnel Management (OPM) systems that compromised 15 years of biometric fingerprint identity data. Critical component of secure biometric solution This and other breaches at companies in financial services, healthcare and other industries have fuelled concerns about the fraudulent use of stolen biometric data, which liveness detection can help prevent. According to Acuity’s principal analyst, Maxine Most, “one of the main challenges ahead is educating markets about what constitutes the integrity of a biometric system, including how to apply best practices for liveness detection.” Multispectral fingerprinting works reliably for a broad range of people, across a wide range of conditionsThe firm said in its September 2017 financial services whitepaper that liveness detection is a critical component of a secure, well-architected biometric solution, and one of the most important countermeasures to biometric spoofing and presentation attacks. Optimal fingerprint capture technology HID Global’s patented multispectral fingerprint imaging technology captures unique characteristics from the surface and subsurface of the finger, providing the most reliable fingerprint capture technology available today. Multispectral fingerprinting works reliably for a broad range of people with normal, wet, dry or damaged fingers, across a wide range of conditions -- from dirt and grease to sunlight to wet or cold conditions. These devices provide field-updatable ‘liveness detection’ that helps future-proof deployed systems against new threats as criminals continue to escalate their attacks and techniques. The sensors use a top-ranked NIST certified MINEX III minutia algorithm for proven interoperability with industry standard fingerprint template databases.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are emphasizing the theme of tailgating in booth #1715 at the GSX (formerly ASIS) exhibition in Las Vegas, NV from September 25-27. GSX is an annual event that brings together 22,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official turnstile sponsor of the show. Access technologies are critical for granting or denying entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with security entrances. This complete solution ensures only one person enters per valid authorisation. The following solutions will be on display in Boon Edam’s booth: Preventing tailgating and intrusion Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centres Tourlock 180+90: The industry’s best-selling security revolving door will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock: Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centres. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorisation, followed by an iris scanning technology inside the portal from Iris ID called the iCAM7S Series reader, to confirm identity. Mantrap entrance with two-factor authentication Circlelock Combi: This half-portal solution is the newest entry from Boon Edam. The Combi transforms an existing swinging door into a high security mantrap entrance that prevents piggybacking. It also enables organisations to save on both space and renovation costs. In the booth, the half portal will demonstrate a two-factor authentication scenario: initial authentication using an AMAG Symmetry card reader to enter the portal, followed by facial scanning technology from StoneLock Pro to open the second door. Lifeline Speedlane Swing: The industry’s slimmest optical turnstile will feature a custom, integrated pedestal that incorporates the MorphoWave touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification, all in a stylish, cohesive design. Integrating card readers and barcode scanners The Boost is suitable for the integration of a variety of access control systems, ranging from card readers and barcode scanners to various biometric devices New! Lifeline Boost: A brand new, stylish access control pedestal designed by Boon Edam to perfectly complement the popular Lifeline optical turnstile series. The Boost is suitable for the integration of a variety of access control systems, ranging from card readers and barcode scanners to various biometric devices. BoonConnect: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Tailgating prize giveaway We’re celebrating our position as the market leader for security entrances, according to a recent report by IHS Markit, with a tailgating-themed prize giveaway. All visitors to GSX are invited to participate by visiting booth #1715 during show hours. Participants have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg grill, a YETI cooler, StubHub tickets and much more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email on October 5.
NEC Corporation (TSE: 6701) announced an investment in Tascent, Inc., a U.S.-based biometric system company, with the aim of accelerating the global expansion of its safety business. The amount of the investment is not disclosed. Recently, the demand for multimodal biometric identification to further bolster security is rapidly growing. Within this environment, the iris identification market is expected to experience significant growth. NEC has been developing biometric identification technologies for more than 40 years, and systems using NEC's Bio-Idiom biometrics have been introduced through more than 700 systems in 70 countries and regions around the world. Moreover, earlier this year, NEC's iris recognition was named the world's most accurate by the U.S. National Institute of Standards and Technology, which has also recently named NEC's face recognition and fingerprint recognition technologies as the most accurate. Next generation iris authentication Established in 2015, Tascent provides multimodal biometric identification systems, with particular emphasis on the iris modality. The company's technologies include optical control technology to remotely capture an accurate, high-quality iris image at high speed, and a user interface (UI) technology that smoothly guides users in support of capturing accurate biometric information. Tascent's technologies are embedded in security systems widely used at airports, government agencies and enterprises around the world. This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition, using Tascent's optical control and UI technologies and NEC's advanced biometric engines and create a next generation iris authentication offering for the public safety market. Accelerating multimodal biometrics applications "In NEC's 'Mid-term Management Plan 2020', the company positions its safety business as an engine for global growth and focuses on the development of this business," said Masakazu Yamashina, executive vice president, NEC Corporation. "Moving forward, NEC aims to expand its social solution business and further boost profitability by acquiring new customers, delivery resources, core technologies and business models through collaborations and M&A, while developing its own core technologies and solutions." "Tascent is excited to partner with NEC to develop world-class identity solutions and to accelerate the adoption of multimodal biometrics in government and commercial applications. The unique combination of NEC and Tascent technologies has great potential to address today's identity challenges, making life easier and safer for people around the world," said Alastair Partington, Founder and Co-CEO of Tascent, Inc.
Matrix, manufacturer and believer of ‘Made in India’ Telecom and Security solutions, has been a host of a number of its maiden event Insight. This event has been conducted and used as a platform to spread the company’s reach in different markets, getting in touch with partners and prospective system integrators. Matrix Insight Indonesia 2018 Matrix is all set for yet another Insight event in Indonesia. The event will be hosted at the Shangri-La Hotel, Kota BNI, Jln. Jend. Sudirman Kav. 1, Jakarta on the 13th of September 2018. Matrix will be highlighting its Unified Communication solution, IP phones and Universal Media Gateways at the event, giving a brief on each for the attendees. They will also be introducing the recently launched Pure IP Solution for Enterprises – PRASAR UCS at the event. Time-Attendance and access control solutions In the Time-Attendance and Access Control domains, Matrix will be exhibiting the Multispectral Fingerprint Reader. This reader reads two layers of a finger, surface and the subsurface, making it an efficient fingerprint reader. Moreover, it reads a user’s finger even if they are dirty, oily, wrinkled, etc. Along with this the award-winning Visitor and Cafeteria Management solutions will also be explained by the solution experts. Additionally, there will be a briefing on their Time-Attendance and Access Control solutions at the event. From the Video Surveillance domain, Matrix will be highlighting its Professional Series of IP Cameras and recently launched Extreme Series of Network Video Recorders (NVRx). A brief will be given on how centralised monitoring works with the Video Management Software. The company will also be explaining how multiple NVRs can be connected for monitoring cameras without a server.
In real life people usually don’t want to get into the drama of being seen as someone other than themselves. The misrecognition problem is not only time consuming, dignity compromising but also, in lots of cases, life threatening, if certain dangerous people are not correctly identified in time. This mistake is no longer affordable in today’s context, whether for an individual, a group or society as a whole. Fortunately, the facial recognition technology has matured, and the security solution based on the said technology is being widely used across the world. Dahua Technology, a premier solution provider in the global surveillance industry, is especially good in this realm as has been proved by multiple championship and new records in major international challenges, including Multiple Object Tracking Challenge, the KITTI 2D Object Detection Evaluation 2012, KITTI Flow Benchmark, Task [Word Recognition] of Incidental Scene Text Challenge and Born-Digital Image Challenge. A Smart AI algorithm optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model Dahua facial recognition It is necessary to explain some basic rules concerning how facial recognition works before the tour to see how Dahua Technology’s products & solutions are applied in various daily scenes. Simply put, big data is useless if the accuracy and efficiency of facial recognition has not been improved to a certain level. The face detection, whether from a snapshot or from a stream of video, requires not only a high-quality camera but more importantly, a smart AI algorithm that optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model which can be crosschecked in the database. The whole process, from taking the picture to comparison, takes as short as 300ms. Suppose there's Tom, a middle level manager in his mid-30s. Let’s follow Tom for a day and see how Dahua Technology’s facial recognition solution plays its role in his perfectly ordinary life. Building security system Tom hurried to his company on the 30th floor of a class A office building, the kind with additional barriers in the lobby between the front gate and elevators. There were long lines in front of the access control machines. Tom reached into his pocket and found unfortunately his access card wasn't there. But Tom should worry no more because the building had just updated the security system with Dahua’s facial recognition solution, which overcame various shortcomings of traditional ways of card or fingerprint scanning, including low efficiency and inadequate security. Compared to a card, apparently it is much less likely for one to lose/replicate/borrow a face. And the access control was no longer a gamble if one's fingerprint works. The powerful cameras with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers Deep learning AI detection Here’s exactly how Dahua’s facial recognition solution works in this scene. The powerful cameras blessed with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers with the ones in the database which takes less than 1 second. The beauty of the solution goes both ways since the company no longer needs to make a card or import finger prints for the newly employed but simply upload their photos into the database that contains up to 10,000 faces. Besides offices, this solution can also be applied to any place that has a high standard for access control, like customs, schools, residential communities, etc. Smart access solution Tom stepped into a bank. On behalf of his company, Tom had some serious business to discuss with the bank, which, at this hour, was full of people. And before Tom started to worry about the time to be spent waiting and if he could make it to the next meeting on time, he heard his last name called and was led into the VIP room. Now how did the bank manage do that? Not by human efforts for sure. No clerk could remember each and every face and match it with a particular name and particular business without making any mistake. That’s why a facial recognition solution is essential to the business. The immediate detection of a VIP face could be easily matched with the white list in the database. No delay or misidentification and all VIP treatment. This goes not only for banks. Hotels, hospitals and casinos alike will also benefit from this solution that secures the proper respect those exceptional customers deserve. Preventing unauthorised access Tom went to the vault of the bank for the first time in his life. He was happy that now he was trusted by the company with such important mission. He walked fast and went in front of the escort. But before he could raise his hand to touch the door of the vault, a warning siren was triggered. The escort, with a reassuring smile, caught up and patted on Tom's shoulder and explained the whole situation to him. No unauthorised personnel could intrude the sensitive areas blessed with Dahua’s facial recognition solution No unauthorised personnel, be it Tom or Jerry, could intrude the sensitive areas blessed with Dahua’s facial recognition solution. The face captured and automatically optimised by the camera would be put into real time comparison with the authorised faces in the data base and the low percentage of similarity, from a pure mathematical point of view, would immediately trigger the alarm. Other limited access areas like labs and archives will also enjoy better protection with this facial recognition solution. Security identification management After a long day’s work, Tom went to see a football game with a friend. The show began even before they entered the stadium because they saw an infamous football hooligan got rejected and taken away outside the entrance gate. Tom, who had been through plenty of adventures during the day, kind of figured out what happened. And Tom’s friend, who happened to be an employee of Dahua Technology, took the chance to explain how Dahua’s facial recognition solution informed the security force to deal with any persona non grata on the black list as soon as they showed their faces. Of course, this solution could be widely applied to other areas like airports, train stations, or in other words, city management. So, this was a day in Tom’s life, which was endowed with some dramatic coincidence but totally realistic in every scene. These examples were far from exhaustion of all the possible applications of Dahua facial recognition solution that fully activates big data gathered and thus spawns a great many creative applications in terms of security and business, resulting indeed into a Safer Society and Smarter Living, as has always been envisioned by Dahua Technology.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
National Security, a global safety and security products manufacturing company, has delivered some advanced security solutions equipped with the latest technology. The company has been known to meet every business challenge that enterprises face with its solutions. Their global reach and unparalleled range of products and services assisted customers in ensuring safety, security and business with the right solutions. Security access challenge Since this manufacturer of safety and security products was spread across India, it required a reliable time-attendance and access control system. However, the major issue lay with the implementation of such a system across different locations in India. Another issue that the company needed to deal with was to assign different attendance policies and shifts to its employees. The manufacturer also required a centralised management for their time-attendance and access control system. Solution Connected all locations with their central location for time-attendance Integration with HRMS software Centralised monitoring and control of all devices Auto Data Push to a central server Configured flexible attendance policies Products COSEC DOOR FOP: Fingerprint based Door Controller with Touch-Sense Keypad COSEC CPM MIFARE SMART: Card Personality Module for Mifare Smart Card COSEC PANEL LITE: Site Controller for Controlling Multiple Door Controllers COSEC ENROLL FINGER: Enrolment Station for Enrolling Finger COSEC CENTRA LE: Application Software for 1000 Users, Expandable up to One Million Users COSEC LE TAM: Time-Attendance Module for COSEC CENTRA LE COSEC LE ACM: Access Control Module for COSEC CENTRA LE COSEC USER1000: User License for 1000 Users Results Enhanced time-attendance solution with flexibility Fast fingerprint recognition Reduced costs and time savings on maintenance Excellent after-sales support Centralised monitoring Direct salary generation using HRMS integration
Varsity Management is an innovative education system focused on learning and leadership. Varsity offers well-designed courses plans that are in sync with the state and national board curricula. Based on the re-engineered learning patterns, these plans help teachers provide multisensory learning and develop social and thinking skills in students. Varsity Management is empowering 3,85,000+ students annually with its presence across 465+ schools, PAN India. Recording accurate attendance data The main requirement of the organisation was to bring its time-attendance under the same network umbrella. Varsity Management Pvt Ltd wanted to manage time-attendance of more than 15,000 employees at 100+ locations across India. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records of the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of staff members. They required a biometric hardware solution that could precisely capture employees’ attendance. Moreover, they needed instant SMS notifications for certain events like missing in/out punch, attendance summary, etc. Matrix meticulously studied the needs of Varsity Management along with its regional partner Vigilant Technologies Time-attendance management solution Matrix meticulously studied the needs of the institute along with its regional partner Vigilant Technologies. Having discussed in depth with Varsity’s team, Matrix offered its comprehensive Time-Attendance solution for managing and tracking staff movement from a single place. Matrix has installed 130 COSEC DOOR FOT V3 biometric time-attendance terminals at 100 locations across India. HR/Admin could easily track attendance of all employees and generate different types of reports for timely salary payment. Now users are updated instantly on different events like missing in/out punch, attendance summary, etc. when it occurs. Benefits of biometric time-attendance terminal Centralised Monitoring and Control Efficient Time-Attendance Management Quick and Easy Salary Calculations Improved Productivity Customised Reports
The potential for catastrophic injury in the petrochemical industry makes safety training and credentialing of employees imperative. Coordinating this process for a variety of industries, including many in the petrochemical fields of southern Alabama, is Training Solutions for Construction and Industry (TSCI). The mission of TSCI is to promote and facilitate workforce development ‘by providing industry-recognised training with portable credentials to create a diverse, trained and sustainable workforce’. TSCI provides computer-based and instructor-led training developed by the Association of Reciprocal Safety Councils (ARSC) and based on requirements from the Occupational Safety and Health Act (OSHA) and the U.S. Department of Homeland Security. Within one day, a person can gain all of his or her required training for a year, and it will be accredited. ID cards with encoded results Workers who successfully complete a TSCI safety orientation receive a tamper-proof ID card, encoded with the results of his or her training. “ID cards give students a record of their training and eventual access to a plant,” said Jack Fecas, Operations Manager, TSCI. The card is valid for one year. If other safety or specialised training is completed during that year, the card is encoded with the additional credentials. All member plants of TSCI and ARSC member organisations recognise and accept the ID card. Workers look to TSCI for training in such areas as fire safety, process safety management, confined space entry, respiratory protection, hazardous energy, basic first aid and CPR, scissor lift, scaffolding, excavation and trenching, elevated work surfaces, electrical safety and disaster site safety. The Office of Homeland Security also can set criteria for credentialing, such as asking for drug screen results. Site-specific and fire safety training TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill In addition to its basic orientation training programs, TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill. “Some companies using dangerous materials have wind socks to indicate which direction the wind is blowing, telling employees which exit route is safe for use at that time,” said Fecas. “This kind of training needs to be site-specific.” Other site-specific training might include basic alarm system safety, teaching employees what to do when they hear a constant alarm versus what they might do if they hear several short bursts of an alarm. About 1,500 workers take the basic orientation program from TSCI every year, and the numbers are growing. With only one printer, clearly more capacity was needed. Fargo’s DTC550 printer/encoder Fecas knew that his organisation needed more capacity in order to handle the increasing volume, so he began looking for an additional printer – one that was fast, yet reliable. He needed barcode code technology and a printer that could encode new data as workers took additional classes. TSCI found all of the requirements it was seeking in Fargo’s DTC550 Direct-to-Card printer/encoder from ID Wholesaler. Not surprisingly, the security offered by the DTC550 was a primary selling point for Fecas. In addition to being recommended by other ARSC Safety Councils, it just made good business sense. TSCI chose a standard holographic overlaminate available with the DTC550, which improves the card’s durability and reduces the risk of counterfeiting. More than 80 percent of training occurs at the TSCI offices, according to Fecas, but it also can take place at a plant site. With the new DTC550 able to handle the increasing demand at TSCI, the old printer will be used for remote training, thus increasing TSCI’s ability to meet the needs of its customers. Workspace security The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers" “The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers,” Fecas added. “They still have information to learn at the plant, but they are ready to go to work.” “We have had ID cards since we began in 1995,” he said, “but with the early cards, there was much more hand-work. Our operator had to add a photo by hand and then wait for the laminating machine to heat up before the card could be laminated. The evolution has been very interesting. In addition, we have been very pleased with the service provided by the Fargo printer and by ID Wholesaler. I can pick up the phone or send an e-mail, and a representative is available for assistance.” Most secure system “We recommended the DTC550 printer because it is very reliable and has more than one holographic laminate choice,” said Jeff Gunhus, ID Wholesaler Sales Team Leader. “TSCI originally bought just the printer and had to wait until its next budget cycle to purchase the lamination unit. They liked the fact that the Fargo printer had an upgrade path. It is important to listen to our clients’ wants, needs and concerns,” Gunhus added. “Then we simply do our best to help them out.” “If a company is going to do business nowadays, it needs to be secure,” adds Fecas. “Our business relies on plants and regulatory agencies trusting what we do. We need to be on the cutting edge when it comes to information technology. The best system is the most secure system. We made a decision to go with what has been tried and true and working in industry now.”
JK Tyre & Industries Ltd. have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to Time-Attendance and Visitor Management. Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees Matrix Time-Attendance solution Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage Time-Attendance of over 500+ workers. Moreover, we provided Employee Self Service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so we delivered Visitor Management software, which helped them create a visitor pass, fetch visitor records and generate reports of the same. 40% Increase in Productivity of Employees and Workers Results Reduction in Cumbersome HR tasks Automatic Maintenance of Visitor Records on Day-to-Day basis 40% Increase in Productivity of Employees and Workers The Products COSEC VEGA FAX - Fingerprint and Card based Door Controller with Touchscreen, IP65, Wi-Fi and 3G/4G Connectivity Option COSEC PATH RDFM - Fingerprint and Card based Exit Reader with IP65 COSEC CENTRA ME - Application Server Platform with 500 Users and Expandable up to 1,000 Users for Basic Access Control and Raw Event Data COSEC ME TAM - Time-Attendance Software Module for COSEC CENTRA ME Users COSEC ME ESS - Employee Self Service Software Module for COSEC CENTRA ME Users COSEC ME VMM - Visitor Management Software Module for COSEC CENTRA ME Users
JCB Co. Ltd, the only international payments brand based in Japan, will conduct a pilot trial of its latest JCB Biometrics Card with fingerprint authentication. JCB's contactless payment solution is provided by IDEMIA, a global augmented identity solution provider. Toppan Printing will also take part in the demonstration trial in respect of card personalisation. Users first record one or more fingerprints for authentication purposes. When they want to buy something, they need only touch the fingerprint sensor on the card's lower right corner with their finger so as to authenticate payment. The fingerprint record is only kept in the card and given that fingerprint authentication is also done on the card, merchants do not need any further equipment to accept payment. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment Secure customer experiences While currently most contact chip cards rely on users entering a PIN number for authentication, this will be replaced by the fingerprint authentication. With the new JCB Biometrics Card strict security is upheld with fingerprint authentication for any payment method, while maintaining efficiency and speed. The pilot trial first involves issuing the JCB Biometric Card to JCB employees from April. Once card users have recorded their fingerprints using a smartphone or tablet app, they can make purchases via fingerprint authentication at merchants accepting JCB Contactless payments. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment. JCB will continue to explore and develop various authentication solutions in order to provide consumers with reliable and secure customer experiences.